Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 04:55
Static task
static1
Behavioral task
behavioral1
Sample
0e054a90c4e24cdc9848cfd67a5855bb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0e054a90c4e24cdc9848cfd67a5855bb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0e054a90c4e24cdc9848cfd67a5855bb_JaffaCakes118.html
-
Size
44KB
-
MD5
0e054a90c4e24cdc9848cfd67a5855bb
-
SHA1
296dfc64256ae8a304727bd8ae296d7e4b76270c
-
SHA256
6bcfa9fa1d595a30e5acadeeeb4764fba7e86963242f9d4b2d34d0afd0418e1f
-
SHA512
0856017d18e8756253111b0261736e8457af3430e9bb1c354fa410688d8b778cd362491620b50bbc688a9046475e7d20fb9cc4918a97d39b736f54e74c4dda91
-
SSDEEP
768:D0IeY/eUe/e16egEEdeWeBcbegeTe+epSbe+eXeOeplbeMeA7ceIefeSeVeSed6B:D0IeAeUe/ewezgeWeiegeTe+e8e+eXe8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C6F70C71-8143-11EF-BD1D-D238DC34531D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000c979ead100087f6dce91c796ae4b9808784f811b95d4ecdbf6a52656b4a2f3a0000000000e8000000002000020000000db6e792a8a4da09d774545984d10717bddb825f4b6a7d4fe752c023420110d7c20000000ac8cc83c9a48dced69b0832d0631850fc101e6f32334c0b7a1ba69dec5096ba44000000027a8b6569b485e37adf5b2a1111a964632356af53a02e75830082bbeaba66860d6a7a8a09850616ab6c9c6aa26046f23b6d4e3af5aa8f47714720ab8df902bdf iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0ebd29b5015db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434093228" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 3016 2876 iexplore.exe 30 PID 2876 wrote to memory of 3016 2876 iexplore.exe 30 PID 2876 wrote to memory of 3016 2876 iexplore.exe 30 PID 2876 wrote to memory of 3016 2876 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e054a90c4e24cdc9848cfd67a5855bb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52281750ab282580bbf00247cfbb819de
SHA1da34ac919bf173398a2dd873fb928c7c707590cd
SHA256205c7c659038d1dbb33dd7ba270b06ef8a93756cbd7438947049e8842e888d34
SHA5123d0772104a2d667d33a9c044bb940217a3177d4f3f9ed2392a9bcdc9eedc1e61e9e7d2c95e17962d41ef71ede76fa421fd86d29772495308edef7718640fff0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2fe30f490c3739b3d52e5538d8b17fd
SHA19603144010b6d1cd152fbd9020b771aedee65a35
SHA2564ab1f62b86ede5d4e031381779fd64d12a4fef35254c83b17158c55d817f2189
SHA512ba2eb689f1b8d206c88d2b15d789066a1bda42df7a7523e4e342f917602f8e5899a553edb4d00087a501c466098853abef10f2bde16eb9591965ad947154b997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0094820c4387a7d52c213127814cbf9
SHA1befc2d715161c60ba483a2e54001a376cc27b7f9
SHA2566eed91ee13eeedcfa205683b7e1a53cea0954c679e739bbb4d73eadae250b8c9
SHA5123e699b19c0b4a8360cc97dee9017983eaef197c6d4ecf3215958c521e34e6a9c1ae9101352bfef9f9453888127aeb19e8a021ca0c495ee76387a5bff74ba125e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5581f8667c824c7aa1994ec6550e2f2c0
SHA1c7b391989d6d3c3b08780f0fdc55378ef52bda89
SHA256df97460d512332727f7ed4e95417da27994cbc92b5d6dd1c62fe9285982dc528
SHA51222f4c5f7d0396c55e379bd5a2f1ae2c93a339977e190ea81b7da3fa52ce4f67d34719d834bbe552b1b88d9a6a85382542c20d85ec876dcb1a89aa58863fdcb44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a12341badeb377e60e39b3a85532700
SHA1cec3b006bd06b4eccba6bc1cad39298e564e87b7
SHA2566522da4933ea31b9f40f400ef7c219d978a67d51f1e5fc1688ba0b8233fe482d
SHA512870820f081fe5c9d38764e42c29a3d0413a7726949bc512b8294c71a57cb95f7dc209fe987a7a7dbae0ac459e0ad1abb1ca7e1806cf5ed4477099464c8f86339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d67942a83944c9066a254e5a175dd545
SHA1e595a61082fbbcbe8a85a273c585955e07a9b5df
SHA2564e536d0313494985cd21581e80e32703983b0e5808145fe37f9b42f533af8e65
SHA5129c5a3681bcde6aa3a181b373cc1942b6431ae9d63e424fc936a0d86375b94148d202d1b632747b0a9d0fbd1d4b5148432707a2ec3889fa5a4e0aac38325697fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f76afeb0d287aebf8c0a970ca6582693
SHA1e61e65e2d9c414557d2995a1bbd20cd561959c03
SHA256d9b67f105f3288a06a71f3b851724977c74aa68a0a3f5b30ac5feff8320e0322
SHA512337f08c7fad6e0aaabff34fc3bdadb76427f6c80da984ead3a25bd5efc5a4ba11755f989dba3ae7ba3bc8361d34d6fc4cb870be3f4497dbf2459ea40364c4770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d260eb6665c0f130919254bac1230980
SHA1a3dbc14cda65da06adb989756be5b7b6524bd495
SHA25678bb7072b33436e4c41ea4ab88304e05767b36e8ccbfe6d3882668ee259916b0
SHA5125aca71a872ffd9fe9274c2e376414065f6774978d32491a01f762a810ff6c84956a96ca01344f87a81c2ab6faacc1bd2bde6ce618e97ccd60b630f63d1a34109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549b55388b384408ad60dffd355d4a936
SHA10c17aeef3ccb2ec1c926c2bc7b948fa29121ee54
SHA2561c9631b7f8856455ab96ea58b8221ad026775957d8c95de1f066e1ef806d3e1e
SHA5123966f5386fe95858b303d8e6e0dbc586ead8748983a40212deff7e7d6507623df5f562e01cc214c5fa541cacc96cef69b26477290ce877ef01ae3c500493b91a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5386425b2dcc347be4fc484bed801fdcd
SHA1b3c2e006fc6615740a805c46ce811ec50991f7b7
SHA256714abff0cabd0b07ff324461ef888200c910d168f7eeabb7a582b816c42d7971
SHA5129a26e20d5d03186da1ef1c5f62d0a767cfa366834a919589da47bcd498d1f87c43b0e522885142ba013d44a1defc32972326e5578b5da617a1d40832d446eb70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b608cb5361bb66f1caaa0f9598d5ab
SHA18497a5648021d330193d2ee63a74417a79f30e22
SHA2568115d5ed56ec7b0c082831eb711b936e3db20e422a5365bcde6ae5c350f1e39d
SHA51203a468e3132ea5cf3b8517f8a66a5d7202a3cc9fcbf31f45db757cf3236bdbe97356d5f2becc6102eddcda5e2559761119dc91b291925b3ba3fcd10e99168ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d637739aa0b6549d80b5c9a3e9fba2c7
SHA1ea77615cf17948bb1ea54bc49b44c5bf4b91a737
SHA256d7858d0f1905e46b76df090678346b43b9f484f8edade5a5fa491e006f8a2c72
SHA5120c755e08590c51fdbf4aa7ef76f833b061e8a88d3e04ea3e6e6abce52fcd53b01bc3970b02bda28e7bc454c98793f7b59a6d1d98b57a4f1e923e501d6032aee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5629b66731860ddfd5ff5449ff7eadb30
SHA19857d624de09fb1fafdc5d55be442d3c45e6880a
SHA25615b014a856d1a058ef76779aba39bf7f0328a5a921664d83b9024ee37dcb294d
SHA5129e63c8449e8283127fdff70c2db222ab8dba337dccd97fb7f68522e3c5525a1ced9cc315dd8e072a0606f6b767cd903a4ba49f00c2970e427518c42c13eb8628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5d5726add57d1773050ba6ae4333cf4
SHA1630b805628d59a415acf19c530fbcfb24d4dac00
SHA256f5041020ac6f4c3315ad5366c2bd2e1b1be42877cce51d82eac81cabb377c745
SHA5126ffec4d469b3c006015c16710125e7c369933d42b5d4fd836f6a1fc47e11283dacd1c8d36cc735511fb26315e12694c3fb6aa63577ab65a185e43b1dd22d945b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520bad7bf6012865558c7c0dd0f30d13a
SHA1a4eb6cdf7433c7a6adad9a20b2f3432cf890f901
SHA2564961874ca2b31f44310fdf4a269985945e5e2b3c5ec2713067048d35d089164c
SHA5129ac96ce68a394f50f3808ea88f7c4468083c8f1df18a0a4dc5d5833371a05cfd85acc5501823f9341f39ca60e28d1ec91797dcec0dac0720b979e210a75c2805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c659671807435551227e66340fd31d11
SHA138055cd2f99734dfc1762bb3fef48bb7a246104a
SHA2565582bd03b6a21a0049be84b1263fab701421cfa9e3969951aa182395ab7df3ef
SHA512ecdaf73b10581765c8486c16d6ff43b1196bce606e8a07e3ef6fc451866b04b9baef4617a58d0e26959267ea89145adeef4b758bcda6aadadd7e6da0b621db07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f97d19af434aafbf0a2f0fb5d51fe2dd
SHA1891cecb63e3fe06c77a1f41eff20f42136bb02ff
SHA256ae66129f1428cb37020fd014d087e1ea44c4a1eeaa2c3c7e980064a2a1524616
SHA512b60fd2ba674b968e145832209a0a96fa1b896b5eb506fc415378f3649f5a6b6650a12fc97232c73e145ce8a7afe21c831b3425c89327af7d0fb1a31f4f9e1077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5734a07c0394ce98d928bad18820b33a2
SHA13e45e681d4c1c4ffb0f80a2b89642ffcdf70fe5b
SHA25698950a6d0006da11a4d54aa3515e9e998b107a291fdbd08c588bcaa6f1e1592d
SHA5122c7547f45c41b76925ea36bfcd2c789361f129c086a5f4814905d4f8d7137f71b6b0baa77b9ae100161f65fa8096879a95c91b8b97abda766fc34173c9d883c1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b